Concept Guide

Table Of Contents
412| ids dos-profile Dell Networking W-Series ArubaOS 6.5.x| Reference Guide
Parameter Description Range Default
probe-request-rate-thresholds
Rate threshold for probe
request frames.
probe-response-rate-thresholds
Rate threshold for probe
response frames.
rts-rate-quiet-time
Time to wait, in seconds,
after detecting an RTS rate
anomaly after which the
check can be resumed.
60-360000
seconds
900
second
s
rts-rate-threshold
Number of RTS control
packets over the time
interval that constitutes an
anomaly.
0-100000 5000
rts-rate-time-interval
Time interval, in seconds,
over which the packet count
should be checked.
1-120
seconds
5
second
s
spoofed-deauth-blacklist
Enables detection of a
deauth attack initiated
against a client associated to
an AP. When such an attack
is detected, the client is
quarantined from the
network to prevent a man-in-
the-middle attack from being
successful.
true
false
false
tkip-replay-quiet-time
Time to wait, in seconds,
after detecting a TKIP replay
attack after which the check
can be resumed.
60-360000
seconds
900
second
s
Usage Guidelines
DoS attacks are designed to prevent or inhibit legitimate clients from accessing the network. This includes
blocking network access completely, degrading network service, and increasing processing load on clients and
network equipment.
Example
The following command enables a detection in the DoS profile named floor2:
(host) (config) #ids dos-profile floor2
(host) (IDS Denial Of Service Profile "floor2") detect-ap-flood